CC
INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
About FAQ Contact Us Terms of Service Privacy Policy 🌐 العربية
🔐

Welcome — Sign in or create an account for full access.

🔑 Sign In ✨ Register
CISO Consulting
  • Home
  • Platform
    Products
    🛡️ Platform Overview All CISO Consulting features 💎 Pricing & Plans Choose your plan ▶ Live Demo See the platform in action
    Tools
    📊 ROI Calculator Calculate your investment value 🎯 Maturity Assessment Evaluate your security posture ⚖️ Framework Compare Compare security standards ✅ Trust Center Our security & compliance 🏆 Certification Roadmap AI-powered career path 📅 Regulatory Calendar SAMA, NCA, PDPL deadlines 🛡️ Compliance Doc Checker AI-powered document gap analysis
    🚀
    Start Free Today
    Get full platform access for 14 days
    Create Account →
  • Content
    Media
    🎙️ Podcast Episodes Saudi cybersecurity podcast 📰 Security News Latest cybersecurity news 📅 Events & Webinars Webinars, workshops & training 📊Special Reports 🛡️ CyberIntel Reports AI-powered security intelligence
    Community & Resources
    👥 CISO Community Connect with professionals 📚 Resource Library Guides, whitepapers & templates 📖 Glossary Cybersecurity terms explained 📚 Knowledge Base Cybersecurity Q&A hub 📚 Template Marketplace Ready-to-use policies & frameworks 💼 Cyber Jobs Board Saudi cybersecurity jobs 🏛 Consultants Directory Certified cybersecurity experts 🏢 Organizations Directory Verified member organizations 🚀 Enterprise Register Register as consultant or enterprise client
  • Intelligence
    • ⚡ Threat Center Live regional threats
    • 🛡️ CVE Database Vulnerabilities with Saudi AI analysis
    • 📊 Saudi Daily Intelligence AI-Powered Saudi Cyber Brief
    • 🔍 IOC Reputation Checker Check IP, domain, email, hash reputation
    • 📧 Email Header Analyzer Detect spoofing & phishing
    • 📋 Case Studies Documented security incidents
    • 🏆 Product Benchmark Compare cybersecurity solutions
    • ❓ Security Quiz Test your security awareness
    • 🎯 Awareness Campaigns AI-powered awareness campaigns
    • 🗺️ CISO Roadmap Reference guide for cybersecurity professionals
    • 🚨 Saudi Incident Radar Verified KSA cyber incidents
  • Company
    • ◉ About Us Our story & mission
    • ✉ Contact Us We're here to help
    • 💬 FAQ Common questions answered
    • 📖 How to Use Quick start guide
    • 🔄 Changelog Latest improvements
  • 📅 Free Consultation
  • 📜 Terms of Service
  • 🔒 Privacy Policy
🌐 العربية Sign In Create Account
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Quick Access
🎙️ Episodes 📰 News ⚠️ Threats 🛡️ CVEs 🏛️ Frameworks ❓ FAQs
↑↓ navigate ↵ open Ctrl+K search
CISO Consulting
Global vulnerability → Government and Critical Infrastructure CRITICAL 1h Global apt → Cryptocurrency and Blockchain CRITICAL 9h Global malware → Financial Services / Cryptocurrency CRITICAL 10h Global insider → Cloud Computing and SaaS HIGH 11h Global vulnerability → Industrial Control Systems / Operational Technology CRITICAL 11h Global ransomware → Corporate/Enterprise CRITICAL 12h Global ransomware → Retail/E-commerce HIGH 13h Global vulnerability → Software Development and AI/ML Services CRITICAL 15h Global vulnerability → Healthcare, Operational Technology, Industrial Control Systems CRITICAL 16h Global phishing → Enterprise/Information Technology HIGH 17h Global vulnerability → Government and Critical Infrastructure CRITICAL 1h Global apt → Cryptocurrency and Blockchain CRITICAL 9h Global malware → Financial Services / Cryptocurrency CRITICAL 10h Global insider → Cloud Computing and SaaS HIGH 11h Global vulnerability → Industrial Control Systems / Operational Technology CRITICAL 11h Global ransomware → Corporate/Enterprise CRITICAL 12h Global ransomware → Retail/E-commerce HIGH 13h Global vulnerability → Software Development and AI/ML Services CRITICAL 15h Global vulnerability → Healthcare, Operational Technology, Industrial Control Systems CRITICAL 16h Global phishing → Enterprise/Information Technology HIGH 17h Global vulnerability → Government and Critical Infrastructure CRITICAL 1h Global apt → Cryptocurrency and Blockchain CRITICAL 9h Global malware → Financial Services / Cryptocurrency CRITICAL 10h Global insider → Cloud Computing and SaaS HIGH 11h Global vulnerability → Industrial Control Systems / Operational Technology CRITICAL 11h Global ransomware → Corporate/Enterprise CRITICAL 12h Global ransomware → Retail/E-commerce HIGH 13h Global vulnerability → Software Development and AI/ML Services CRITICAL 15h Global vulnerability → Healthcare, Operational Technology, Industrial Control Systems CRITICAL 16h Global phishing → Enterprise/Information Technology HIGH 17h
SHARE LinkedIn X / Twitter WhatsApp Telegram Facebook
Email
← All Episodes
Share this episode
LinkedIn X / Twitter WhatsApp Telegram
📣 Found this valuable?
Found this valuable? Share it with your cybersecurity network
LinkedIn X / Twitter WhatsApp Telegram
LIVE NOW cloud Season 3 · Episode 24

Breaking Down the NCA's New Cloud Security Controls for 2026

🎙 Guest
D
Dr. Ahmed Al-Rashidi
Head of Cybersecurity, Saudi National Bank
📋 Episode Details
Date 23 Feb 2026
⏱ Duration 52 min
👁 Views 3.5K
▶ Plays 1.2K
Category Cloud Security
Season Season 3 · Episode 24


💬 Comments (0)

🔒 Please log in to comment

💬

Be the first to comment

Share this episode
LinkedIn X / Twitter WhatsApp Telegram
📣 Found this valuable?
Found this valuable? Share it with your cybersecurity network
LinkedIn X / Twitter WhatsApp Telegram
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
CISO Consulting

The Kingdom's premier platform for cybersecurity intelligence, expert podcasts, and real-time threat analysis.

Quick Links

  • 🏠 Home
  • ▶ Podcast Episodes
  • 📰 Latest News
  • ⚡ Threat Intelligence
  • ℹ️ About Us
  • ❓ FAQ
  • ✉ Contact Us
  • 🔍 Search
  • 💎 Pricing
  • 📅 Book a Demo
  • 📋 Readiness Quiz
  • 💰 ROI Calculator
  • 📖 Cybersecurity Glossary

Compliance Frameworks

  • 🔒 SAMA CSF
  • 🛡 NCA ECC 2024
  • 📋 PDPL
  • 🏛 NCA CCC
  • ✅ ISO 27001:2022
  • 💳 PCI DSS 4.0

Resources

  • 📚 Resources Library
  • 🏆 Case Studies
  • 🛡️ Trust Center
  • ⚖️ Compare
  • 📋 Changelog
  • 🎫 Support
  • 📖 How to Use
  • 📖 Glossary

Get in Touch

  • 📧 info@ciso.sa
  • 📱 +966550939344
  • 📍 Riyadh, Kingdom of Saudi Arabia

My Account

  • 🔑 Login
  • ✨ Create Account

Newsletter

Get the latest security updates

© 2026 CISO Consulting. All rights reserved. • Powered by CISO Consulting
About • Privacy • Terms • Contact • FAQ • v3.3.11 · Build 260421
🍪 Privacy Preferences
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒 Compliant with Saudi Personal Data Protection Law (PDPL) Privacy Policy →
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

📞 Get in Touch
📧info@ciso.sa
🌐ciso.sa
📍Riyadh, Saudi Arabia
⏰Sun – Thu, 8AM – 6PM AST
🎫 Submit a Request
⚡ Quick Services
🔍
SAMA CSF Assessment
Full compliance gap analysis
›
🛡️
NCA ECC Gap Analysis
Identify your NCA control gaps
›
📋
Security Policy Pack
Complete policy documentation
›
🎓
Compliance Training
Team training on Saudi frameworks
›
Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

What best describes your role?

How likely are you to recommend CISO Consulting to a colleague?

0 = Not at all likely, 10 = Extremely likely

Not at allExtremely likely

Which features do you use most?

Select all that apply

How did you hear about us?

💡 Any additional suggestions?

🎉
Thank you!
Your response has been recorded.
⭐

Rate This Page

Sign In
Overall Rating
 
Detail Ratings (Optional)
How likely are you to recommend this platform?
Not likelyVery likely
✓

Thank You!

Your rating has been received. Your feedback helps us improve.

🔒

Sign In Required

You need an account to continue

🔑 Sign In ✨ Create Free Account

CISO Consulting — For cybersecurity professionals